In this paper, we study the AES block cipher in the chosen-key setting. The adversary's goal of this security model is to find triplets ( m , m ′, k ) satisfying some properties more efficiently for the AES scheme than generic attacks. It is a restriction of the classical chosen-key...
chosen ciphertext securityDue to the proliferation of side-channel attacks, many efforts have been made to construct cryptographic systems that remain provably secure even if part of the secret information is leaked to the adversary. Recently, there have been many identity-based encryption (IBE) ...
Block CipherAESRelated-KeyChosen-KeyWhile the symmetric-key cryptography community has now a good experience on how to build a secure and efficient fixed permutation, it remains an open problem how to design a key-schedule for block ciphers, as shown by the numerous candidates broken in the ...
In this paper, we study the AES block cipher in the chosen-key setting. The adversary's goal of this security model is to find triplets (m,m′,k) satisfying some properties more efficiently for the AES scheme than generic attacks. It is a restriction of the classical chosen-key model, ...
Chosen-key attacksIterated Even-Mansour cipherKey-alternating cipherIndifferentiabilityCorrelation intractabilityThe iterated Even-Mansour cipher is a construction of a block cipher from r public permutations P_1,... ,P_r which abstracts in a generic way the structure of key-alternating ciphers. The ...
In recent years, much attention has been focused on designing provably secure PKE in the presence of key-leakage and almost all the constructions rely on an important building block namely hash proof system (HPS). However, in the setting of adaptive chosen-ciphertext attacks (CCA2), there ...
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In: Proc. of the Topics in Cryptology--CT-RSA 2013. Berlin, Heidelberg: Springer-Verlag, 2013. 84-100. [doi: 10.1007/978-3-642-36095-4_6]Liu S Weng J Zhao Y . Efficient public key cryptosystem ...
选择密文安全性密码协议The public key cryptosystem secure against chosen ciphertext attacks is a very strong secure cryptosystem and is a useful primitive for designing protocols that resisting active adversary. This paper surveys the main results about its construction and applications available in the ...
As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security...
By using well-known techniques, they also showed how their scheme can be made secure against the stronger chosen-ciphertext attacks. The results of our paper are three-fold. First, we give a range-extension construction for weak PRFs that is optimal within a large and natural class of ...